Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 88 matches
- 2017
- Masoud Attarifar, Mohammadamin Baniasadi:
JPEG Image Security by Block Size Estimation and Quality Factor Classification. CyberC 2017: 118-121 - Alexander S. Basan, Elena Basan, Oleg B. Makarevich:
A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks. CyberC 2017: 369-372 - Liang Cao, Yufeng Wang, Qun Jin, Jianhua Ma:
ActiRecognizer: Design and Implementation of a Real-Time Human Activity Recognition System. CyberC 2017: 266-271 - Ning Cao, Yuanyuan Zhang, Yan Li, Bin Xue, Hua Yu, Yingying Wang, Yuyan Shen, Na Li:
Analysis of the Approach to Predict Different Routing Protocols in WSNs. CyberC 2017: 399-402 - Shun-Ping Chen, Jens Gebert:
Investigations of 5G Multiple Radio Access Technology Performance and Resource Selection Behavior. CyberC 2017: 437-444 - Yangjun Chen, Yujia Wu:
Searching BWT against Pattern Matching Machine to Find Multiple String Matches. CyberC 2017: 167-176 - Na Dang, Xiangyu Bai, Haodong Bian:
Content Delivery Routing Strategy Based on Energy Constraint in MDTN-CCN Integrated Network. CyberC 2017: 382-390 - Yi-Wei Deng, Cheng Zhong, Jun Yu, Sujie Shao, Xuesong Qiu:
An Energy-Saving Clustering Strategy of Hybrid Network of Sensors and Mobile CR Nodes. CyberC 2017: 403-411 - Qingfeng Du, Huan Li, Kanglin Yin, Juan Qiu:
VM Reliability Modeling and Analysis for IaaS Could. CyberC 2017: 258-265 - Qingfeng Du, Yue Tian, Tiandi Xie, Kanglin Yin, Juan Qiu:
A Method of Building Fault Repository for Cloud Infrastructure. CyberC 2017: 220-228 - Rishabh Dudheria:
Evaluating Features and Effectiveness of Secure QR Code Scanners. CyberC 2017: 40-49 - Xiang Gao, Guanghui Li:
Design and Implementation of the Prototype of High-Available Distributed Communication System. CyberC 2017: 84-88 - Vahid Amin Ghafari, Honggang Hu:
A New Chosen IV Statistical Attack on Grain-128a Cipher. CyberC 2017: 58-62 - Jun Gu, Bin Gao, Yuanpeng Chen, Long Jiang, Zhao Gao, Xiaole Ma, Yong Ma, Wai Lok Woo:
Wearable Social Sensing and Its Application in Anxiety Assesment. CyberC 2017: 305-308 - Sunyan Gu, Fei Lang:
A Chinese Text Corrector Based on Seq2Seq Model. CyberC 2017: 322-325 - Jinbing Ha, Yunping Yu:
Fault Data Diagnosis of Energy Consumption Equipment for Urban Rail Transit Based on ART2 Model. CyberC 2017: 177-181 - Jin Han, Rongcai Zhao, Zhen Shan, Fudong Liu, Bingling Zhao, Xi Meng, Hongyan Wang:
Analyzing and Recognizing Android Malware via Semantic-Based Malware Gene. CyberC 2017: 17-20 - Xin Hu, Gang Wang, Hongtao Qin, Runnian Ma:
SIRS Model and Stability Based on Open Cyber Ecosystem. CyberC 2017: 1-4 - Yufang Huang, Yi Lin, Rongzhen Miao:
An Auxiliary Blind Guide System Based on Multi-sensor Data Fusion. CyberC 2017: 395-398 - Yingying Huangfu, Liang Zhou, Chenming Yang:
Routing the Cyber-Attack Path with the Bayesian Network Deducing Approach. CyberC 2017: 5-10 - Tingting Jia, Caihong Li, Anping He:
Modeling and Verification of Circuit with Stable-Event. CyberC 2017: 471-475 - Guihua Kang, Kaiyue Xu, Hongbo Kang, Kun-Bei Pan:
The Limited Feedback Precoding Based on the Triplex Codebooks. CyberC 2017: 461-465 - Anwar Ahmed Khan, Mohammad Shoaib Jamal, Shama Siddiqui:
Dynamic Duty-Cycle Control for Wireless Sensor Networks Using Artificial Neural Network (ANN). CyberC 2017: 420-424 - Li-Xin Li, Yong-Shan Ding, Jia-Yan Wang:
Differential Privacy Data Protection Method Based on Clustering. CyberC 2017: 11-16 - Kun Li, Qinghai Ou, Hong Chen, Baoping Zou:
Controller Cluster-Based Interconnecting for Multi-domain SDN Networks. CyberC 2017: 482-485 - Taihao Li, Jianshe Zhou, Naren Tuya, Cuifen Du, Zhiqiang Chen, Shupeng Liu:
Recognize Facial Expression Using Active Appearance Model and Neural Network. CyberC 2017: 182-185 - Xiaoyong Lin, Pengwei Yin, Yun Xia, Yang Yu, Tingting Qiu, Xiaoming Wang, Lixiang Li:
MPLB: A Load Balance Scheme of Joint Resource Scheduling in Heterogeneous Wireless Network. CyberC 2017: 517-524 - Wenyan Liu, Fucai Chen, Hongchao Hu, Guozhen Cheng, Shumin Huo, Hao Liang:
A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture. CyberC 2017: 50-53 - Xia Liu, Xia Huang, Lei Chen, Zhao Qiu, Mingrui Chen:
Improving the Forecasting Accuracy of Civil Aviation Passengers Based on Machine Learning Models. CyberC 2017: 298-304 - Xiangyu Liu, Qiuyang Li, Sonali Chandel:
Social Engineering and Insider Threats. CyberC 2017: 25-34
skipping 58 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 17:02 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint